Search Result Save to File Save as CSV
Your search for 38164 returns 3524 document(s)
Making the key agreement protocol in mobile ad hoc network more efficient, (LNCS-Lecture Notes in Computer Science 2576) Hal 343-356
Author: Gang Yao; Kui Ren; Feng Bao; Robert H.Deng; Dengguo Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study on feasibility and establishment of a security grade certification scheme for the new IT services, (LNCS-Lecture Notes in Computer Science 5576) Hal 769-777
Author: Hangbae Chang; Jonggu Kang; Hyukjun Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Self-initialized distributed certificated authority for mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 392-401
Author: Meng Ge; Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure error-correction network coding in a randomized setting, (LNCS-Lecture Notes in Computer Science 5576) Hal. 570-577
Author: Yejun Zhou, Hui Li, Jianfeng Ma; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next